Back to Search
Start Over
Authenticated Encryption Based on Lesamnta-LW Hashing Mode
- Source :
- Lecture Notes in Computer Science ISBN: 9783030409203, ICISC
- Publication Year :
- 2020
- Publisher :
- Springer International Publishing, 2020.
-
Abstract
- Authenticated encryption refers to symmetric cryptography providing both privacy and authenticity. It is most common to construct it as a block-cipher mode of operation. Another promising approach is to construct it based on cryptographic hashing. This paper proposes a nonce-based authenticated encryption scheme based on the Lesamnta-LW hashing mode. Lesamnta-LW is a block-cipher-based iterated hash function, which is specified in the ISO/IEC 29192-5 lightweight hash-function standard. This paper also shows that the proposed scheme is secure if the underlying block cipher is a pseudorandom permutation. Both of the other ISO/IEC 29192-5 mechanisms, PHOTON and SPONGENT, are hardware-oriented sponge-based hash functions, and nonce-based authenticated encryption schemes can also be constructed based on them. On the other hand, Lesamnta-LW is a software-oriented Merkle-Damgard hash function. Thus, the proposed scheme is a new option for authenticated encryption based on lightweight cryptographic hashing.
- Subjects :
- Block cipher mode of operation
Authenticated encryption
Theoretical computer science
Computer science
business.industry
Hash function
020206 networking & telecommunications
02 engineering and technology
Pseudorandom function family
Symmetric-key algorithm
0202 electrical engineering, electronic engineering, information engineering
Cryptographic hash function
020201 artificial intelligence & image processing
business
Block cipher
Cryptographic nonce
Subjects
Details
- ISBN :
- 978-3-030-40920-3
- ISBNs :
- 9783030409203
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science ISBN: 9783030409203, ICISC
- Accession number :
- edsair.doi...........d7a84ccb9ca3f8f9a785d204ab137831